{"title":"综述:使用机器学习的云计算数据安全","authors":"Pravallika Kandi, Sujith Raj Tarapatla, Surinder Kumar, Harshitha Kadiyam, Dinesh Chowdary, Nageswara Rao Moparthi","doi":"10.1109/IC3I56241.2022.10072968","DOIUrl":null,"url":null,"abstract":"In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"542 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review: Data Security in Cloud Computing Using Machine Learning\",\"authors\":\"Pravallika Kandi, Sujith Raj Tarapatla, Surinder Kumar, Harshitha Kadiyam, Dinesh Chowdary, Nageswara Rao Moparthi\",\"doi\":\"10.1109/IC3I56241.2022.10072968\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"542 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10072968\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072968","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review: Data Security in Cloud Computing Using Machine Learning
In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.